Vai al contenuto principale della pagina
| Titolo: |
Data Science : 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022, Chengdu, China, August 19–22, 2022, Proceedings, Part II / / edited by Yang Wang, Guobin Zhu, Qilong Han, Liehui Zhang, Xianhua Song, Zeguang Lu
|
| Pubblicazione: | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
| Edizione: | 1st ed. 2022. |
| Descrizione fisica: | 1 online resource (520 pages) |
| Disciplina: | 005.7 |
| Soggetto topico: | Data mining |
| Application software | |
| Artificial intelligence | |
| Education - Data processing | |
| Computer engineering | |
| Computer networks | |
| Data Mining and Knowledge Discovery | |
| Computer and Information Systems Applications | |
| Artificial Intelligence | |
| Computers and Education | |
| Computer Engineering and Networks | |
| Persona (resp. second.): | WangYang |
| Nota di contenuto: | Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data Management and Applications -- Research on the Realization Path and Application of a Data Governance System Based on Data Architecture -- 1 Introduction -- 2 Research Status and Development of Data Governance -- 3 Functional Composition of Data Architecture -- 3.1 The Method of Integrating Heterogeneous Data with Internal and External Centralized Data Management -- 3.2 Data Security Classification, Data Right Confirmation and Authorization Methods -- 3.3 Basic Composition and Form of the Data Architecture -- 3.4 Data Governance System Supported by Data Architecture -- 4 Understanding the Data Architecture Supporting the Data Governance System -- 4.1 The Impact of Data on Human Civilization - Recognizing the Importance of Data -- 4.2 Comparison Between Data and Material - Similarity and Particularity of Data and Material -- 4.3 Comparison of Data and Information - the Difference Between Data and Information Determines the Difference in Research Data Governance Methods -- 4.4 The Relationship Between Data and Applications - the Systematicness, Integrity, Relevance and Essence of Data -- 5 Implementation Path of the Data Governance System Supported by the Data Architecture -- 5.1 Distinguish the Information System and Data System, and Develop the Data System by Using the Data-Oriented Software Engineering Method -- 5.2 Unify the Database of the Existing Information System, Build a Data System and Crack the "Data Island" -- 5.3 The Separation of Data Management and Use is Adopted to Simplify the Complexity of Data and Business -- 5.4 The Public Key Infrastructure of the Domestic Commercial Key Algorithm is Used to Realize Data Right Confirmation, Data Ownership Authorization and Data Protection. |
| 5.5 Data Architecture Supports the Construction of a Data Governance System and Solves Data Governance Problems in a Package -- 5.6 Application Example of Data Governance System Based on Data Architecture in County New Smart City -- 6 Conclusion -- References -- Data Quality Identification Model for Power Big Data -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Related Technologies -- 3 Problem Definition -- 4 Proposed Approach -- 4.1 Data Quality Identification Architecture -- 4.2 Data Preprocessing and Grouping -- 4.3 Data Augmentation -- 4.4 Tri-Training Based Detection -- 5 Experiments -- 5.1 Training Data and Baselines -- 5.2 Analysis -- 6 Conclusion -- References -- Data Security and Privacy -- Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic -- 1 Introduction -- 2 Background and Related Work -- 2.1 WF Attacks -- 2.2 WF Defense -- 3 Threat Model -- 4 The Propose TED -- 4.1 Overview of TED -- 4.2 Similar Scale Traces Clustering -- 4.3 Interconversion -- 4.4 Key Feature Extraction -- 5 Performance Evaluation -- 5.1 Preliminary -- 5.2 Performance Metrics -- 5.3 Parameter Tuning -- 5.4 Evaluation -- 6 Conclusion -- References -- Data Hiding in the Division Domain: Simultaneously Achieving Robustness to Scaling and Additive Attacks -- 1 Introduction -- 2 Preliminaries -- 2.1 QIM -- 2.2 Related Work on Resisting Scaling Attacks -- 3 Proposed Method -- 3.1 Division Domain for Data Hiding -- 3.2 D-QIM -- 3.3 Theoretical Analysis for D-QIM -- 4 Simulations -- 5 Conclusions -- References -- BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum -- 1 Introduction -- 2 Related Works -- 3 Zreo-Knowledge Proof -- 4 BMSC: Anonymous Transaction Scheme -- 4.1 Groth16 -- 4.2 Scheme Construction -- 5 Analysis of Anonymity and Security -- 5.1 Analysis of Anonymity. | |
| 5.2 Hide Account Balances and Transaction Amounts -- 5.3 Hide the Transfer Relationships -- 5.4 Analysis of Security -- 5.5 Overspending Attack -- 5.6 Double-Spending Attack -- 6 Conclusion -- References -- Research on the Design and Education of Serious Network Security Games -- 1 Introduction -- 2 Related Work -- 3 Feasibility Analysis -- 3.1 Educational Dilemma -- 3.2 Education Status -- 4 Theoretical Basis -- 4.1 Constructivist Theory -- 4.2 Situational Cognition -- 5 Teaching Design -- 5.1 Design Principle -- 5.2 Design Principle -- 6 Game Design -- 6.1 Game Theme -- 6.2 Game Components -- 6.3 Rules of the Game -- 6.4 Hands-On Game -- 7 Conclusion -- References -- KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Paillier Cryptosystem -- 3.2 Chinese Remainder Theorem -- 3.3 CRT-Based Paillier Cryptosystem -- 3.4 An Optimized Paillier Cryptosystem -- 3.5 Fujisaki-Okamoto Commitment -- 3.6 Blockchain Data Sharing Model -- 4 Privacy Protection Model for Blockchain Data Sharing -- 4.1 Hidden Amount -- 4.2 Transaction Verification -- 4.3 Update Account Balance -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Bilinear Mapping -- 3.2 Access Control Structure -- 3.3 Linear Secret Sharing Scheme -- 4 Blockchain Access Control Scheme Based on MA-ABE -- 4.1 Scheme Overview -- 4.2 Autonomous Identity Management -- 4.3 Selection of Attribute Authorities -- 4.4 Hierarchical Linear Secret Sharing Scheme -- 4.5 Blockchain Access Control Algorithm -- 5 Scheme Analysis -- 5.1 Security Analysis -- 5.2 Comparison of Scheme Cost -- 6 Conclusion -- References -- Applications of Data Science. | |
| Study on the Intelligent Control Model of a Greenhouse Flower Growing Environment -- 1 Introduction -- 2 Problem Scenario -- 2.1 A Floral Growth Factor Analysis -- 2.2 Fuzzy Neural Network -- 2.3 Practice Site and Flowers -- 3 Methods -- 3.1 Framework -- 3.2 Fuzzy Neural Network Model -- 3.3 Design Implementation -- 4 Experimental Results and Analysis -- 4.1 Simulation Analysis -- 4.2 Field Site Experiments -- 4.3 Model Evaluation -- 5 Conclusion and Discussion -- References -- A Multi-event Extraction Model for Nursing Records -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Dataset Annotation -- 3.2 Dataset Analysis -- 3.3 Model -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Comparison Methods -- 4.3 Main Results -- 4.4 Analysis on the Multi-event Argument Attribution Problem -- 5 Discussion -- 5.1 Analysis on High Score Performance -- 5.2 Application of Missing Item Detection -- 6 Conclusion -- References -- Cuffless Blood Pressure Estimation Based on Both Artificial and Data-Driven Features from Plethysmography -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Empirical Feature Extracting Branch -- 3.2 Data-Driven Feature Extracting Branch Based on LSTM -- 3.3 Feature Gathering and Multichannel Output Module -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Competing Methods -- 4.3 Results and Analysis -- 5 Conclusions -- References -- User Attribute Prediction Method Based on Stacking Multimodel Fusion -- 1 Introduction -- 2 Related Machine Learning Algorithms -- 3 Multimodel-LightGBM -- 3.1 Stacking Algorithm -- 3.2 Multimodel-LightGBM -- 4 Experiment and Result Analysis -- 4.1 Dataset -- 4.2 Feature Engineering -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- How is the Power of the Baidu Index for Forecasting Hotel Guest Arrivals? -A Case Study of Guilin -- 1 Introduction. | |
| 2 Literature Review -- 2.1 Baidu Index and Tourism Research -- 2.2 Tourism Forecasting with Big Data -- 3 Data -- 3.1 Data Collection -- 3.2 Keyword Selection for the Baidu Search -- 3.3 Data Preprocessing -- 4 Variable Test and Metrics -- 4.1 Unit Root -- 4.2 Granger Casualty Test -- 4.3 Metrics -- 5 Model Fitting and Performance Evaluation -- 5.1 Forecasting Model Without Any Baidu Index -- 5.2 Autoregressive Distributed Lag Model Establishment with Univariate Baidu Index -- 5.3 Autoregressive Distributed Lag Model Establishment with Multiple Baidu Indexes -- 5.4 Summary -- 6 Conclusions, Limitations, and Future Work -- 6.1 Conclusions -- 6.2 Limitations -- 6.3 Future Work -- References -- A Facial Size Automatic Measurement and Analysis Technology -- 1 Introduction -- 2 Facial Data Acquisition -- 3 Facial Morphology Analysis System -- 3.1 Feature Point Recognition -- 3.2 Location of Three-Dimensional Facial Feature Points -- 3.3 Facial Morphology Analysis -- 3.4 Output Module -- 4 Experimental Comparison -- 5 Conclusion -- References -- Intelligent Industrial Auxiliary System Based on AR Technology -- 1 Introduction -- 2 System Design and Implementation -- 2.1 Real-Time Display -- 2.2 Human-Computer Interaction -- 2.3 Perception and Positioning -- 2.4 Scene Switch -- 3 Example Display -- 4 Summary and Outlook -- References -- Infrastructure for Data Science -- Industry-Oriented Cloud Edge Intelligent Assembly Guidance System -- 1 Introduction -- 2 Method -- 2.1 Instance Segmentation -- 2.2 Pose Estimation -- 2.3 Cloud-Edge Joint Technology -- 3 Experiment and Analysis -- 3.1 Experimental Setup -- 3.2 Experimental Results -- 4 Conclusion -- References -- An Intelligent Data Routing Scheme for Multi-UAV Avionics System Based on Integrated Communication Effectiveness -- 1 Introduction -- 2 Proposed Integrated Communication Effectiveness Metric. | |
| 2.1 Link Effectiveness. | |
| Sommario/riassunto: | This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Management and Applications; Data Security and Privacy; Applications of Data Science; Infrastructure for Data Science; Education Track; Regulatory Technology in Finance. |
| Titolo autorizzato: | Data Science ![]() |
| ISBN: | 981-19-5209-4 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910586578103321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |